Three Idea & Design Protection Tips For Interior Designers Ping® July 2015


Interior Design can be a competitive business. It is no secret that one designer may begin a project, only to have it completed by another, including a former employee. As a result, Designers need to be vigilant about protecting both their designs and relationships. The case of Hunn v. Dan Wilson Homes, Inc., 13-11297, 14-10365, 114 qUSPQ2d 2002 (5th Cir 2015) offers several lessons for Designers.


Ben Lack, who was employed as a draftsman at the Plaintiff architectural design firm Marshal Hunn Designs (HD), resigned from his job while in the middle of a project for the firm’s client, Dan Wilson Homes, Inc. (DWH). After Lack’s resignation, Lack was hired by DWH to complete the project. HD sued Lack and DWH alleging that they secretly agreed in advance with DWH to cut HD out of the business. The court ruled in favor of Lack (and DWH) finding they never entered into any “secret agreement” and there was no merit to the eight other legal claims, including copyright infringement and false designation of origin under the Lanham Act.


DWH is a custom home construction company. DWH contracted with HD to produce plans for four (4) custom homes. DWH wanted the plans drafted by Lack. Lack was the only HD employee who worked on the four custom homes for DWH and HD’s only representative at all weekly meetings with respective homeowners.

While the home construction projects were still underway, Lack informed HD of his desire to resign. Lack also requested by email that a friend of his convert some of the project files into AutoCAD versions. This conversion was required because Lack maintained his own copy of AutoCAD software on his home computer.

HD permitted draftsman to take home files because they often worked on projects on their own home computers as well as work computers. Lack had permission to work on the files at home.

After Lack’s employment ended, HD ask Lack to return physical files related to the project, but not the AutoCAD files.

The relationship between DWH and HD deteriorated. DWH offered to pay HD a prorated amount for the work completed up to the date of termination of Lack. HD refused. DWH later tendered payment for the full contract price, even covering items and services that had not been completed.

HD declined to accept payment and responded by filing a complaint alleging eight causes of action: 1) copyright infringement, false designation of origin under the Lanham Act, 3) breach of contract, 4) breach of fiduciary duty, 5) breach of covenant not to solicit, 6) tortious interference, 7) violation of the computer fraud and abuse act, and 8) conspiracy.

During his deposition, Lack indicated that he believed he would have had at least two more weeks of employment after tendering his notice of resignation, and that he would be able to complete the plans. DWH also believed that Lack would complete the plans under the employment of HD.

The District Court granted summary judgment in favor of the defendants Lack and DWH on all claims. HD appealed the judgment. The appellate court affirmed the District Court’s decision.


The District Court found that there was no breach of contract because DWH’s only duty was to pay for the services which he offered to do.

The District Court found there was no breach of fiduciary duty because any duty terminated upon termination of employment, and Lack did not disclose trade secrets or any confidential information. Although HD alleged that the AutoCAD files were confidential and proprietary information, the court held that they were not because HD had disclosed them to Lack without restriction.

The District Court found that there was no violation of the computer fraud and abuse act because Lack never exceeded his authority. HD routinely permitted employees to take files home and put them on their personal computers.

Although Lack had a non-complete clause in his at-will employment agreement, the Court found there was no violation because the clause was unenforceable. The clause states “in the event you leave or are separated from Hunn Designs’ employment, you agreed not to solicit, either directly or indirectly, business from, or undertake with any customers serviced by you while the employment of Hunn Designs, or any other Hunn Designs customers for a period of two years thereafter.”

The District Court held the non-compete clause was unenforceable do to a lack of independent consideration. Continued employment in at-will agreement is illusory.

The District Court ruled that even if the drafts of house designs were copyrightable, there was no violation of copyright because of the existence of an implied license authorizing use of the designs.

The court found particularly interesting “the fact that the home owners themselves essentially came up with their design ideas and sought to have those self designed homes built [after their ideas were] placed into the drafting stage.”

The District Court cited the 7th Circuit case of I.A.E., Inc. v. Shaver 74 F.3d 768 (7th Cir. 1996) for the proposition that an architect in a similar situation had granted an implied license. Even though the architect in Shaver testified that he did not intend for use of the drawings past the drafting stage unless he was the architect on the project, this was not supported by the record.

The court found there was no violation of the Lanham ask prohibition against false designation of origin, because there was no evidence that use of the plans had a substantial economic effect on interstate commerce, as required by the Lanham Act.

Take Aways:

Based on my review of the court’s opinion, there are potentially three (3) things the Plaintiff (Hunn) could have done differently that may have changed the outcome of this case. First, have a clear, written policy in place defining what constitutes trade secrets and other proprietary information and proper methods for handling those. Second, have policies restricting how and when employees may take company property and files home, and addressing storage and return of property and files. Third, create and enforce clear conditions for access, distribution and use of drafts, proposals, files and other works-in-progress to avoid inadvertently granting an implied license to third parties such as contractors, consultants or clients.



Theft or Transformation?

Can Someone Else Sell My Instagram Photos?

My readers know that I am always following developments in and around copyright law and the many ways that developing technology is challenging existing legal structures. [See Here] That’s why I was shocked when the following tweet came across my Twitter feed:


For the uninitiated, Instagram is “a way to share your life through pictures” captured on a mobile phone, often using a “filter” to transform the image. In other words, Instagram is about sharing content that one creates. Under U.S. law, the author (creator) is the copyright owner.

Copyright protects works of creative artistic expression such photographs, and importantly, gives the owner the exclusive rights to reproduce, distribute, publicly display, publicly perform, and modify a work for a certain period of time.

My gut reaction was to think that New York artist Richard Prince’s canvases featuring other people’s Instagram photos is a clear case of copyright infringement. To paint a complete picture (pun intended), it must be noted that Prince has added a short message posted as a comment below what is otherwise just a screen shot of the original image.

However, as many legal pundits have commented, the situation may be more complicated. The is a good example of the new legal issues that our culture of mash-ups and remixes have created. The internet is awash with altered, reposted, and aggregated media like text, music, and video. Sophisticated, ubiquitous and surprisingly simple tools pervade a growing range of Internet-based platforms turning amateurs into auteurs. Without doubt these platforms have spawned a huge wave of creativity — but they also raise difficult questions about attribution and ownership.

It is not surprising that Prince is unabashed and unreserved in his appropriation of other’s photographs. This is not the first time Prince has landed in the legal cross-hairs for appropriating another’s art. In the landmark 2013 copyright case of Cariou v. Prince, Prince prevailed after being sued by French photographer Patrick Cariou. That lawsuit concerned Prince’s 2008 “Canal Zone,” a series of paintings that incorporated photographs by from Cariou’s 2000 book Yes, Rasta.

That case turned on an increasingly criticized formulation of the “fair use” doctrine, the “transformative use” test as applied by the U.S. 2d Circuit. “Transformative use” is not one of the four enumerated fair use factors. Rather, it is simply one aspect of the first fair use factor, which looks to the “purpose and character” of the use. The future of the Cariou “transformative use” test was cast in doubt by the 7th Circuit’s withering criticism of its application in the recent case of Kienitz v. Sconnie Nation .

Whether Prince’s “remix” works are “fair use” or little more than theft may depend on how the 2d Circuit chooses to apply the “fair use” test, should it come to that, given the 7th Circuit’s thorough criticism of the 2d Circuit’s previous application.

Five Best Ways to Protect Your Ideas


When I first meet a client, I am often asked “How can I protect my ideas?” While it may seem like a simple question, getting the answer right is often tricky. That’s because one can’t actually own an idea, in and of itself. Sounds confusing, I know. The five best ways to protect your ideas are 1) Identify, 2) Organize, 3) Register (or restrict), 4) Monitor, and 5) Enforce. This articles focuses on how to identify the best ways to protect your ideas.

Regardless of industry, Ideas are the keys to any successful business. While one cannot “own” an idea, one can protect one’s Intellectual Property rights that relate to the embodiment or manifestation of that idea. For example, Copyright, Patent, Trademark, Trade Secret and Publicity Rights are all forms of Intellectual Property rights that grant exclusive rights to the owner, both artistic and commercial.

Copyright protects works of creative artistic expression such as books, movies, audio-visual music, paintings, photographs, and importantly, software. Copyright protection requires that a work be “fixed” in tangible format (this includes electronic format) and gives the owner (called the “author”) of such works the exclusive rights to reproduce, distribute, publicly display, publicly perform, and modify a work for a certain period of time.

Patents (utility and design), Trademarks and Trade Secrets protect creative commercial expression sometimes known as “industrial properties,” as they are typically created and used for industrial or commercial purposes.

A Patent protects the invention or discovery of “any new and useful process, machine, article of manufacture, or composition of matter, or any new and useful improvement thereof.” A Patent gives the inventor “the right to exclude others from making, using, offering for sale, or selling” the invention in the United States or “importing” the invention into the United States for a period of time.

A Trademark is any word, name, symbol, or device, or any combination, used, or intended to be used, in commerce to identify and distinguish the goods of one manufacturer or seller from others, and to indicate the source of the goods. In short, a trademark is a brand name or logo that is a distinctive sign which is used to prevent confusion among products in the marketplace. A Trademark enjoys protection indefinitely, as long as it is being used.

An industrial design right protects the form of appearance, style or design of an industrial object from infringement.

A Trade Secret is an item of non-public information concerning the commercial practices or proprietary knowledge of a business. Public disclosure of trade secrets may sometimes be illegal. A Trade secret enjoys protection indefinitely, as long as it is being kept secret.

Some rights are “statutory” in that they exist because they are granted by the Constitution of the United States, e.g. Copyright and Patent. Other rights arise from “use,” e.g. Trademark and Trade Secret rights. Some arise under State law, e.g., Rights of Publicity. Not all types of intellectual property require registration in order to obtain, maintain or enforce one’s rights. However, registration is HIGHLY RECOMMENDED if available, is required in certain circumstances and, even when not required, registration often confers several benefits that enable enforcement, reduce the risk and costs of enforcement, and provide additional incentives and remedies for enforcement.

The term “Intellectual Property” denotes the specific legal rights described above, and not the intellectual work, concept or idea itself. Oftentimes, the largest value of a businesses can be traced to its intangible assets. Knowing how to identify intangible assets and understanding which Intellectual Property rights apply to these assets is critical to the ability to protect and commercialize one’s ideas. Therefore, great care should be given to maintaining and enhancing their power and value. Value can be increased through a carefully planned and executed strategy. Innovative companies that successfully leverage their Intellectual Property rights will stand to benefit most from the opportunities presented by the current economic marketplace and demand for innovation.


Focus | Vision | Perspective | Passion

Executives face a confusing and dynamic set of challenges ensuring their business remains legally compliant. Yet few can afford the highly-qualified and versatile legal staff needed to deal with today’s complex legal & regulatory environment.

Adler Law Group was created to provide clients with a competitive advantage by enabling them to leverage their intangible assets and creative content in a way that drives innovation and increases the overall value of the business.

For a FREE, no-obligation 1 hour consultation to learn the best ways to identify, protect and leverage your ideas, please call: (866) 734-2568, click:, or write: David @

Adler Law Group – Providing innovative legal counsel that elevates aspirations to achievements.™

Copyright, Fair Use & Media

Digital Media

Digital Media

Media Creation & Consumption is Challenging Traditional Legal Notions.

At a time when #media creation & consumption has transformed, two recent cases, both involving Fox News Network on opposite sides of the “fair use” defense to copyright infringement, highlights the evolving and dynamic legal challenges facing business and content creators. In each case, Fox News loses on Summary Judgment.

Photographs, Fair Use & Social Media

The first case, North Jersey Media Group, Inc. v. Jeanine Pirro and Fox News Network, LLC, involves what many recognize as the “now iconic photograph of the firefighters raising the American flag on the ruins of the World Trade Center on September 11, 2001.” The photograph – which bears a striking resemblance to Joe Rosenthal’s World War II photograph of the Iwo Jima flag-raising – has become a similarly striking symbol of American patriotism.

That similarity was not lost on a production assistant for a Fox News program “Justice with Judge Jeanine” who posted the two images, unaltered, on the show’s Facebook Page, along with the phrase “#neverforget,” allegedly to commemorate the twelfth anniversary of the attack.

The case is noteworthy for its analysis of the “fair use” defense in a social media context. While the Copyright Act grants authors certain exclusive rights, including the rights to reproduce the copyrighted work and to distribute those copies to the public (17 U.S.C. § 106(1), (3)) one often quoted and widely misunderstood limit to those rights is the doctrine of “fair use,” which allows the public to draw upon copyrighted materials without the permission of the copyright holder in certain circumstances. The fair use doctrine is an after-the-fact defense to infringement, not a pre-emptive justification to use another’s work without permission.

Educated in journalism and media studies, the production assistant acknowledged that she understood a copyright to be something that is owned by someone else although she had no training in copyright law either in college or during her tenure at Fox News. She had been working at Fox News for approximately three years, had previously sought legal advice regarding use of photographs on the broadcast, but never in connection with posting images to the program’s Facebook page.

The key take-away for businesses and digital marketers alike is the need for vigilance when using third-party content on social media. Employee education and training on what copyright protects, what it doesn’t, and how it works may help prevent your business form facing a similar situation.

Media Monitoring, Digital Content & Copyright Fair Use

The second case, Fox News Network, LLC v. TVEyes, Inc., involves a company that monitors and records all broadcasts by more than 1,400 television and radio stations twenty-four hours per day, seven days per week. This content is indexed and organized in a searchable database that allows subscribers to search terms, determine when, where, and how those search terms have been used, and obtain transcripts and video clips of the portions of the television show that used the search term.

Fox News Network, LLC sued to enjoin TVEyes from copying and distributing clips of Fox News programs. TVEyes asserted that its system and services are permitted under the doctrine of “fair use.”

The court found that TVEyes service was a fair use. Unlike other services that simply “crawl” the Internet, culling existing content available to anyone willing to perform enough searches to gather it, the indexing and excerpting of news articles, where the printed word conveys the same meaning no matter the forum or medium in which it is viewed, the service provided by TVEyes is transformative. By indexing and excerpting all content appearing in television, every hour of the day and every day of the week, month, and year, TVEyes provides a service that no content provider provides. Subscribers to TVEyes gain access, not only to the news that is presented, but to the presentations themselves, as colored, processed, and criticized by commentators, and as abridged, modified, and enlarged by news broadcasts.

The key take away for technology companies that rely on content is what the court says about features of the Services (as opposed to the technology itself, e.g. the software/platform): the issue of fair use is for the full extent of the service, TVEyes provides features that allow subscribers to save, archive, download, email, and share clips of Fox News’ television programs. The parties have not presented sufficient evidence showing that these features either are integral to the transformative purpose of indexing and providing clips and snippets of transcript to subscribers, or threatening to Fox News’ derivative businesses.”

In other words, evidence that certain features are essential to the use of a service, may be sufficient to show how the features (service) exist above- and-beyond what stale or static content can show.

You Don’t Have to Muddle Through

When it comes to understating evolving technology legal risks, your business can’t simply muddle through. The professionals at the Adler Law Group can help you adopt conduct risk assessments, provide employee training and methodologies for approaching these challenges by setting objectives, determining scope, allocating resources, and developing practices that will efficiently and effective manage risks, while keeping pace with the business.

For a free consultation, call us at (866) 734-2568, send and email to or visit our web site

Contracts & Copyright: Issues for Authors, Writers & Creative Professionals

To find out more about how the Adler Law Group can help your business identify risk and issues related to intellectual property ownership, corporation or LLC formation, or just assess risk associated with your business, contact us for a freeno-obligation consultation by emailing David @, visiting our web site, or calling toll free to (866) 734-2568.

Failure to Mind Corporate Details Leads to Loss of Copyright, Infringement Lawsuit

The case of Clarity Software, LLC v. Financial Independence Group, LLC is a great example the serious, negative consequences to intellectual property ownership when business owners and legal counsel fail to ensure that tasks are completed.

The short version is that the creator of computer software, Vincent Heck, sold the copyright in his software to settle a debt to a creditor, Eric Wallace, who intended to form Clarity Software, LLC to own and distribute the software. The lawsuit was for infringement of the copyright in the software.

As they say, “the devil is in the details.” In this case, the detail that became a devil, and ultimately prevented Wallace from enforcing a copyright in the software, was the fact that Clarity Software, LLC was never properly formed and therefore lacked standing to sue for infringement.

Forgive me for employing yet another trite phrase, but “truth is often stranger than fiction.” The Defendant proved that a veritable comedy of errors had occurred resulting in no record of the formation, including 1) the Department of State of Pennsylvania losing the certificate of organization, along with all records of the submission and filing of the certificate of organization, 2) the Plaintiff’s bank (PNC Bank) losing its copy certificate of organization provided when Wallace opened a bank account (even though PNC Bank still had the signature card completed when the account was opened), and 3) Wallace, himself a former President of the Pennsylvania Institute of Certified Public Accountants, losing his copy of the certificate of organization and all records of his communications with his attorney.

Defendant successfully moved for summary judgment based on its argument that Plaintiff did not own the copyright at issue in the litigation since it was not properly organized as a Pennsylvania limited liability company and never acquired valid ownership of the copyright.

Hat tip to Pamela Chestek and her blog, Property Intangible, where she first wrote about this case October 13, 2014. The opinion and order can be found here: Clarity Software, LLC v. Financial Independence Group, LLC, No. 2:12-cv-1609-MRH (W.D. Pa. Sept. 30, 2014).

To find out more about how the Adler Law Group can help your business identify risk and issues related to intellectual property ownership, corporation or LLC formation, or just assess risk associated with your business, contact us for a free, no-obligation consultation by emailing David @, visiting out web site, or calling toll free to (866) 734-2568..

Contract Drafting: Limitations of Liability & Exceptions

One of the most important functions of a contract is to reduce uncertainties and mitigate risks. That is why almost all professional or personal services contracts contain “limitations of liability” provisions. Although they may seem like densely-worded, “boilerplate” provisions, and often overlooked, these provisions broadly affect a party’s ability to bring a claim, show liability, and prove damages that can be recovered.

A limitation of liability clause is a provision in a contract that limits the amount of exposure a company faces in the event a lawsuit is filed or another claim is made. As a preliminary observation, it is important to note that enforcement of limitation of liability provisions vary from state to state. The general rule in contract law is that in the commercial context, many states have found these clauses to be a mere shifting of the risk and enforce them as written.

Limitations of Liability generally address two areas of concern. First, the types of claims that may be barred. Second, the amount or scope of liability for claims that are not barred.

Limiting The Type Of Claim

A typical limitation of liability clause may look something like this:


This clause limits the types of damages that may be claimed, prohibiting claims for:

  • Consequential damages (damages resulting naturally, but not necessarily, from the defendant’s wrongful conduct, BUT they must be foreseeable and directly traceable to the breach)
  • Incidental damages (includes costs incurred in a reasonable effort, whether successful or not, to avoid loss, or in arranging or attempting to arrange a substitute transaction)
  • Special damages (often treated the same as “consequential” by courts, “special” damages have been defined as those that arise from special circumstances known by the parties at the time the contract was made)
  • Punitive damages (damages that may be awarded which compensate a party for the exceptional losses suffered due to egregious conduct; a way of punishing the wrongful conduct and/or preventing future, similar conduct)
  • Exemplary damages (See “Punitive damages”)
  • Indirect damages (See “Consequential damages”)
  • Lost Profits (Cases in New York (and elsewhere) have a held that a clause excluding “consequential damages” may no longer be enough to bar “lost profits” claims; therefore, consider including more specific provisions in contracts- if parties want to exclude lost profits for breach of contract, a clause specifically excluding “lost profits” should be included.)

Lost profits that do not directly flow from a breach are consequential damages, and thus typically excluded by a limitation of liability clause like that above. But lost profits can be considered general damages (and thus recoverable) where the non-breaching party bargained for those profits, and where the profits are a direct and probable result of the breach.

Limiting The Amount Of The Claim

If found to be enforceable, a limitation of liability clause can “cap” the amount of potential damages to which a party is exposed. The limit may apply to all claims arising during the course of the contract, or it may apply only to certain types of claims. Limitation of liability clauses typically limit the liability to one of the following amounts: (i) the compensation and fees paid under the contract; (ii) an sum of money agreed in advance; (iii) available insurance coverage; or (iv) a combination of the above.

Parties can and typically do agree in their contract that liability is capped at some dollar amount. If liability exists and if damages can be proved, then the aggrieved party recovers those damages, but only up to the agreed cap. Sometimes these are mutual; other times they are one-sided. Sometimes the cap is a fixed sum (e.g., “the amounts paid for the services” or “$100,000”). Other times, the parties may choose to tie the cap to the type of harm, (e.g. personal injury, property damage, violations of confidentiality obligations).

However, sometimes that parties may agree that certain types of harm should not be limited. These “exceptions” put the parties in the same position they would have occupied if there was no limitation of liability provision in effect. For example:

  • exposure for violations of intellectual property (copyright, trademark, trade secret, patent) or proprietary rights (right of publicity, right of privacy, contractually-defined proprietary information)
  • in the event of an obligation to indemnity and defend for 1) breach of intellectual property representations, and/or 2) third party intellectual property or proprietary rights
  • in the event of an obligation to indemnify because a party didn’t have the right to provide data or information
  • in the event of an obligation to indemnify and defend for non-compliance with data security standards
  • exposure for violations of confidentiality obligations
  • personal injury or property damage due to negligent acts or omissions

Best Practices

Businesses that rely upon limitation of liability clauses should periodically reexamine those clauses. Questions that you should be asking include: “what’s my maximum recovery if the other party breaches,” and “what’s my maximum liability if I breach?”

These are only effective if enforceable, that’s why drafting is key. According to many courts, following certain drafting guidelines will help reduce the likelihood that a limitation of liability clause will not be enforced. Such guidelines include:

  • Make the clause conspicuous: set the clause in bold face print or underline or otherwise place the clause apart from the rest of the text on the page on which it appears so that the other party is aware of its existence.
  • Make the language clear and concise: make sure that the clause is concise and unambiguous as it relates to the contract as a whole.
  • Identify specific risks: be specific in identifying the types of damages you think should be excluded.
  • Negotiate the clause: discuss the clause with the party that is signing the agreement and negotiate if there is a discrepancy.
  • Retain drafts of revisions: keep drafts of any revisions made to the limitation of liability clause so that you have proof that the clause was negotiated.
  • Add language stating that these damages are not recoverable even if they were, or should have been, foreseeable or known by the breaching party.
  • Recite that the limitation of liability clause is an agreed benefit of the bargain, and that it remains in effect even if any remedy under the contract fails of its essential purpose.
  • Consider including a liquidated damages clause for specific breaches, which would replace a damages claim.

DISCLAIMER: THIS IS NOT LEGAL ADVICE. Please consult  qualified attorney to discuss your specific situation.

If you are concerned about how to tighten your contracts, we may be able to help. We can review your contracts, your business practices, and advise on whether there is room for improvement.

Please contact us for a no-fee, no-obligation consultation. (866) 734-2568 David [at]